-
1
-
-
70349234852
-
An analysis of the GWV security policy
-
Austin, Texas, US, November
-
J. Alves-Foss and C. Taylor. An analysis of the GWV security policy. In Proc. ACL2 Workshop, Austin, Texas, US, November 2004.
-
(2004)
Proc. ACL2 Workshop
-
-
Alves-Foss, J.1
Taylor, C.2
-
3
-
-
21644433634
-
Xen and the art of virtualization
-
Bolton Landing, New York, USA, October
-
P. Barham, B. Dragovic, K. Fraiser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proc. 19th ACM Symposium on Operating Systems Principles (SOSP-19), Bolton Landing, New York, USA, October 2003.
-
(2003)
Proc. 19th ACM Symposium on Operating Systems Principles (SOSP-19)
-
-
Barham, P.1
Dragovic, B.2
Fraiser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
4
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
D. Basin, J. Doser, and T. Lodderstedt. Model driven security: from UML models to access control infrastructures. ACM Transactions on Software Engineering and Methodology, 15(1):39-91, 2001.
-
(2001)
ACM Transactions on Software Engineering and Methodology
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
5
-
-
0003400251
-
Secure computer system: Unified exposition and Multics interpretation
-
Technical Report ESD-TR-75-306,MTR-2997 rev. 1, MITRE, 1976
-
D. Bell and L. LaPadula. Secure computer system: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306,MTR-2997 rev. 1, MITRE, 1976.
-
-
-
Bell, D.1
LaPadula, L.2
-
6
-
-
0842268048
-
A refinement strategy for circus
-
A. Cavalcanti, A. Sampiao, and J. Woodcock. A refinement strategy for circus. Formal Aspects of Computing, 15(2-3):146-181, 2003.
-
(2003)
Formal Aspects of Computing
, vol.15
, Issue.2-3
, pp. 146-181
-
-
Cavalcanti, A.1
Sampiao, A.2
Woodcock, J.3
-
7
-
-
70349239751
-
Xen security modules
-
April 2007. Available from
-
G. Coker. Xen security modules. Xen Summit 2007 Presentation, April 2007. Available from http://www.xensource.com/xen/xensummit.html.
-
Xen Summit 2007 Presentation
-
-
Coker, G.1
-
8
-
-
0003765587
-
-
The Common Criteria Project Sponsoring Organizations, v. 3.1, rev. 1 edition, September, Also referred to as ISO 15408
-
The Common Criteria Project Sponsoring Organizations. Common Criteria for Information Technology Security Evaluation, v. 3.1, rev. 1 edition, September 2006. Also referred to as ISO 15408.
-
(2006)
Common Criteria for Information Technology Security Evaluation
-
-
-
9
-
-
0041684496
-
-
PhD thesis, Purdue University, West Lafayette, Indiana, US
-
D. Denning. Secure Information Flow in Computer Systems. PhD thesis, Purdue University, West Lafayette, Indiana, US, 1975.
-
(1975)
Secure Information Flow in Computer Systems
-
-
Denning, D.1
-
10
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5), May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
-
-
Denning, D.1
-
11
-
-
84974776068
-
A classification of security properties for process algebra
-
R. Focardi and R. Gorrieri. A classification of security properties for process algebra. J. Computer Security, 3(1):5-33, 1994.
-
(1994)
J. Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
12
-
-
70349247222
-
Formal modelling of a separation kernel hypervisor
-
Technical Report 13, University of York, May
-
L. Freitas and J. McDermott. Formal modelling of a separation kernel hypervisor. Technical Report 13, University of York, May 2008.
-
(2008)
-
-
Freitas, L.1
McDermott, J.2
-
13
-
-
70349236399
-
Circus based development environment
-
Technical Report 12, University of York, Sep
-
L. Freitas and J. Woodcock. Circus based development environment. Technical Report 12, University of York, Sep 2007.
-
(2007)
-
-
Freitas, L.1
Woodcock, J.2
-
16
-
-
84885586195
-
A separation kernel formal security policy
-
Boulder, Colorado, US, July
-
D. Greeve, M. Wilding, and W. M. Vanfleet. A separation kernel formal security policy. In Proc. ACL2 Workshop, Boulder, Colorado, US, July 2003.
-
(2003)
Proc. ACL2 Workshop
-
-
Greeve, D.1
Wilding, M.2
Vanfleet, W.M.3
-
17
-
-
40449092394
-
Applying formal methods to a certifiably secure software system
-
Jan/Feb
-
C. Heitmeyer, M. Archer, E. Leonard, and J. McLean. Applying formal methods to a certifiably secure software system. IEEE Transactions on Software Engineering, 34(1):82-98, Jan/Feb 2008.
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 82-98
-
-
Heitmeyer, C.1
Archer, M.2
Leonard, E.3
McLean, J.4
-
19
-
-
19044364805
-
Information Technology-Z Formal Specification Notation-Syntax, Type System and Semantics. ISO/IEC, first edition,
-
ISO/IEC 13568
-
ISO/IEC 13568. Information Technology-Z Formal Specification Notation-Syntax, Type System and Semantics. ISO/IEC, first edition, 2002.
-
(2002)
-
-
-
22
-
-
31844452867
-
The framework of selective interleaving functions and the modular assembly kit
-
Fairfax, Virginia, US, November
-
H. Mantel. The framework of selective interleaving functions and the modular assembly kit. In Proc. Formal Methods in Security Engineering, Fairfax, Virginia, US, November 2005.
-
(2005)
Proc. Formal Methods in Security Engineering
-
-
Mantel, H.1
-
23
-
-
43049159119
-
Re-engineering Xen internals for higher-assurance security
-
13(1):17-24, 2008
-
J. McDermott, J. Kirby, B. Montrose, T. Johnson, and M. Kang. Re-engineering Xen internals for higher-assurance security. Information Security Technical Report, 13(1):17-24, 2008.
-
Information Security Technical Report
-
-
McDermott, J.1
Kirby, J.2
Montrose, B.3
Johnson, T.4
Kang, M.5
-
24
-
-
84974747891
-
Proving noninterference and functional correctness using traces
-
J. McLean. Proving noninterference and functional correctness using traces. J. Computer Security, 1(1), 1992.
-
(1992)
J. Computer Security
, vol.1
, Issue.1
-
-
McLean, J.1
-
25
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
Oakland, California, US, May
-
J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proc. IEEE Symposium on Research in Security and Privacy, Oakland, California, US, May 1994.
-
(1994)
Proc. IEEE Symposium on Research in Security and Privacy
-
-
McLean, J.1
-
26
-
-
48649091670
-
-
B. Randell and J. Rushby. Distributed secure systems: Then and now. In 23st Annual Computer Security Applications Conference (ACSAC), Miami, FL, US, December 2007.
-
B. Randell and J. Rushby. Distributed secure systems: Then and now. In 23st Annual Computer Security Applications Conference (ACSAC), Miami, FL, US, December 2007.
-
-
-
-
27
-
-
0029232082
-
CSP and determinism in security modelling
-
Oakland, California, US, May
-
A. Roscoe. CSP and determinism in security modelling. In Proc. IEEE Symposium on Security and Privacy, Oakland, California, US, May 1995.
-
(1995)
Proc. IEEE Symposium on Security and Privacy
-
-
Roscoe, A.1
-
29
-
-
0001868056
-
Non-interference through nondeterminism
-
Brighton, UK, November
-
A. Roscoe, J. Woodcock, and L. Wulf. Non-interference through nondeterminism. In Proc. ESORICS, Brighton, UK, November 1994.
-
(1994)
Proc. ESORICS
-
-
Roscoe, A.1
Woodcock, J.2
Wulf, L.3
-
30
-
-
0016984825
-
Protection in operating systems
-
August
-
W. Ruzzo, M. Harrison, and J. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461-471, August 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Ruzzo, W.1
Harrison, M.2
Ullman, J.3
-
33
-
-
33750248123
-
Building a MAC-Based security architecture for the Xen open-source hypervisor
-
Tucson, Arizona, US, December
-
R. Sailer, T. Jaeger, E. Valdez, R. Cáceres, R. Perez, S. Berger, J. Griffin, and L. van Doorn. Building a MAC-Based security architecture for the Xen open-source hypervisor. In Proc. 21st Annual Computer Security Applications Conference, Tucson, Arizona, US, December 2005.
-
(2005)
Proc. 21st Annual Computer Security Applications Conference
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Cáceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.7
van Doorn, L.8
|